Restore topic to revision:
You will be able to review the topic before saving it to a new revision
Copy text and form data to a new topic (no attachments will be copied though).
Name of copy: Allow non WikiWord name You will be able to review the copied topic before savingRename/move topic...
scans links in all public webs(recommended)Rename/move topic...
scans links in CBI_ComputerSecurity web only
Delete topic...
scans links in all public webs(recommended)Delete topic...
scans links in CBI_ComputerSecurity web only

[X] Hide this message. Notice: On June 30, 2016, UMWiki service will be decommissioned. If you have information in UMWIki that needs to be preserved, you should make plans to move it before that date. Google Sites is anticipated to be the most popular and appropriate alternative for users because it offers a more modern and user-friendly interface and unlimited capacity. To learn more about the features of Google Sites and other alternatives, and to identify which one best fits your needs, see the Universitys Website Solution Selection Guide. If you have concerns or would like help regarding this change and your options, please contact Technology Help at help@umn.edu

Secure Computer System: Unified Exposition and Multics Interpretation (1975 | PDF): This was the final in a series of four papers in which David Bell and Leonard La Padula of the not-for-profit MITRE Corporation outlined a mathematical model for creating secure computing systems. The first two papers (both 1973) produced a mathematical framework and model; while the third (1974) developed refinements and extensions to the model. This fourth paper, created in 1975 and published by MITRE in 1976, synthesized the preceding papers and provided a practical example of the security model using the MULTICS operating system.

Kenneth Biba:

R. Bisbey II and D. Hollingworth:

Protection Analysis: Final Report (1978 | PDF): One of two seminal studies of computer system vulnerabilities.

Committee on Multilevel Data Management Security:

Multilevel Data Management Security (1983), Air Force Studies Board, Commission on Engineering and Technical Systems, National Research Council, National Academy Press: Popularly known as the "Woods Hole Report," this was a major, influential study of database security.

Department of Defense Computer Security Evaluation Center:

Trusted Computer System Evaluation Criteria (1982): First version of the TCSEC made available to the public. It is also called the Powder Blue of the "rainbow series" of TCSEC publications.

Trusted Computer System Evaluation Criteria (Orange Book) (1983, 1985 | PDF): Full version of the TCSEC that influenced study and development of systems.

B. DeWolf and P. Szulewski:

Final Report of the 1979 Summer Study on Air Force Computer Security (1979): Also called the Draper Report, it describes the state of the art at that time.

Ford Aerospace:

Secure Minicomputer Operating System (KSOS) (1978 | PDF): Describes an implementation of a provably secure operating system compatible with the UNIX operating system.